default search action
Designs, Codes and Cryptography, Volume 25, 2002
Volume 25, Number 1, January 2002
- Stefka Bouyuklieva:
On the Automorphisms of Order 2 with Fixed Points for the Extremal Self-Dual Codes of Length 24m. Des. Codes Cryptogr. 25(1): 5-13 (2002) - Philip A. Eisen, Douglas R. Stinson:
Threshold Visual Cryptography Schemes with Specified Whiteness Levels of Reconstructed Pixels. Des. Codes Cryptogr. 25(1): 15-61 (2002) - Arne Winterhof:
Polynomial Interpolation of the Discrete Logarithm. Des. Codes Cryptogr. 25(1): 63-72 (2002) - Etsuko Bannai, Mitsuhiro Sawano:
Symmetric Designs Attached to Four-Weight Spin Models. Des. Codes Cryptogr. 25(1): 73-90 (2002) - D. Brozovic, Chat Yin Ho, Akihiro Munemasa:
A Correction to "Incidence Matrices and Collineations of Finite Projective Planes" by Chat Yin Ho, Designs, Codes and Cryptography, 18 (1999). Des. Codes Cryptogr. 25(1): 91-93 (2002) - Tim Blackmore, Graham H. Norton:
Lower Bounds on the State Complexity of Geometric Goppa Codes. Des. Codes Cryptogr. 25(1): 95-115 (2002)
Volume 25, Number 2, February 2002
- K. T. Arasu, Warwick de Launey, Siu Lun Ma:
On Circulant Complex Hadamard Matrices. Des. Codes Cryptogr. 25(2): 123-142 (2002) - Sandy Ferret, Leo Storme:
Minihypers and Linear Codes Meeting the Griesmer Bound: Improvements to Results of Hamada, Helleseth and Maekawa. Des. Codes Cryptogr. 25(2): 143-162 (2002) - Stelios Georgiou, Masaaki Harada, Christos Koukouvinos:
Orthogonal Designs and Type II Codes over Z2k. Des. Codes Cryptogr. 25(2): 163-174 (2002) - Sergio Cabello, Carles Padró, Germán Sáez:
Secret Sharing Schemes with Detection of Cheaters for a General Access Structure. Des. Codes Cryptogr. 25(2): 175-188 (2002) - Jürgen Bierbrauer:
The Theory of Cyclic Codes and a Generalization to Additive Codes. Des. Codes Cryptogr. 25(2): 189-206 (2002) - Jorge Guajardo, Christof Paar:
Itoh-Tsujii Inversion in Standard Basis and Its Application in Cryptography and Codes. Des. Codes Cryptogr. 25(2): 207-216 (2002)
Volume 25, Number 3, March 2002
- Ingrid Biehl, Johannes Buchmann, Safuat Hamdy, Andreas Meyer:
A Signature Scheme Based on the Intractability of Computing Roots. Des. Codes Cryptogr. 25(3): 223-236 (2002) - Massimo Giulietti, Fernanda Pambianco, Fernando Torres, Emanuela Ughi:
On Complete Arcs Arising from Plane Curves. Des. Codes Cryptogr. 25(3): 237-246 (2002) - Koen Thas:
A Theorem Concerning Nets Arising from Generalized Quadrangles with a Regular Point. Des. Codes Cryptogr. 25(3): 247-253 (2002) - Luis Martínez, Antonio Vera-López:
Ring-Valued Assignments to the Points of a t-Design. Des. Codes Cryptogr. 25(3): 255-262 (2002) - Claude Carlet, Yuriy V. Tarannikov:
Covering Sequences of Boolean Functions and Their Cryptographic Significance. Des. Codes Cryptogr. 25(3): 263-279 (2002) - Carles Padró, Ignacio Gracia, Sebastià Martín Molleví, Paz Morillo:
Linear Key Predistribution Schemes. Des. Codes Cryptogr. 25(3): 281-298 (2002) - John B. Polhill:
Constructions of Nested Partial Difference Sets with Galois Rings. Des. Codes Cryptogr. 25(3): 299-309 (2002) - Edoardo Ballico, Antonio Cossidente:
Hermitian Veronesean Schemes. Des. Codes Cryptogr. 25(3): 311-317 (2002)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.